If you operate in regulated industries or or fall anywhere within the supply chain of a federal agency, Managed Detection and response (MDR) services can make regulatory compliance much easier.

Using a third-party to monitor networked environments for incidents will help business leaders sleep better knowing they have implemented best practices for protecting their computer systems and their clients’ information.  These services typically involve a combination of network technology tools and data security expertise to constantly track network activity.  When suspicious or malicious activity occurs, cybersecurity experts perform triage and alert the business if there is a potential that the network may be compromised.

In addition to helping the operations team with day to day security, MDR also helps the teams achieve compliance with Payment Card Industry Data Security Standards, healthcare’s HIPAA security rule and service organizations’ SOC 2 Security requirements.

NIST – Though NIST is only mandatory for government agencies and companies that work with them, the standards are based on general best practices. Compliance with them sets the foundation for compliance with other regulations like HIPAA and PCI DSS.  A Managed Detection and response service that aligns to NIST helps organizations secure their data and network, whether you work with federal agencies or not.

PCI DSS – The standards for protecting credit card data are very precise as to requirements for log capture, monitoring and storing.  Using a managed detection and response service will allow a compliance officer to check those boxes knowing they are covered.  This is not trivial, as the PCI DSS requirements include up to 28 places where monitoring is required to be confirmed.

HIPAA – Requirements for tracking data and knowing the status of protected health information are key to maintaining HIPAA compliance.  A managed detection and response system can allow your team to know that intrusion detection is under the control of professionals.

SOC Reporting – System and Organization and Control (a.k.a. SOC 2 for Security) includes 15 references to monitoring activities.  These include system and network monitoring that are key elements of the COSO framework of internal controls.  A SOC auditor can quickly assess an environment’s health knowing these monitoring controls are in place, saving time and money.

Contact Us

If you have questions please call Mike Childs or Brett Bane at Pondurance using (317) 663-8694, or call Robert Ramsay or Bryan Gayhart at Barnes Dennig using 513-241-8313.